Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9506915 | Applied Mathematics and Computation | 2005 | 6 Pages |
Abstract
Recently, Hsu et al. showed that Ku and Wang's authenticated key agreement protocol is vulnerable to the modification attack and then proposed an improved protocol, called HWWM protocol. In this paper, we argue that the HWWM protocol is still vulnerable to the modification attack and cannot also withstand the password guessing attack. Then, we propose an improved protocol to solve these problems.
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo,